HackMD MCP Server has Server-Side Request Forgery (SSRF) vulnerability
- Severity:
- Medium
Description
A Server-Side Request Forgery (SSRF) vulnerability that affects all users running the HackMD MCP server in HTTP mode. Attackers could exploit this vulnerability by passing arbitrary hackmdApiUrl values through HTTP headers (Hackmd-Api-Url) or base64-encoded JSON query parameters.
Recommendation
Update the hackmd-mcp package to the latest compatible version. Followings are version details:
- Affected version(s): >= 1.4.0, < 1.5.0
- Patched version(s): 1.5.0
References
Related Issues
- Predictable results in nanoid generation when given non-integer values - CVE-2024-55565
- tarteaucitron.js allows UI manipulation via unrestricted CSS injection - CVE-2025-31138
- Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) - Vulnerability
- happy-dom allows for server side code to be executed by a <script> tag - CVE-2024-51757
- Tags:
- npm
- hackmd-mcp
Anything's wrong? Let us know Last updated on September 15, 2025